Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption
暂无分享,去创建一个
Ron Steinfeld | Joseph K. Liu | Cong Zuo | Siyin Yang | James Macindoe | Joseph K. Liu | Ron Steinfeld | Cong Zuo | James Macindoe | Siyin Yang
[1] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[2] R Nivetha,et al. A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2018, International Journal of Innovative Technology and Exploring Engineering.
[3] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[4] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Joseph K. Liu,et al. A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing , 2014, IEEE Transactions on Information Forensics and Security.
[6] Fatos Xhafa,et al. An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.
[7] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[8] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[9] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[10] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[11] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.
[12] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[13] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[14] Joseph K. Liu,et al. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.
[15] Bala Srinivasan,et al. Secure sharing and searching for real-time video data in mobile cloud , 2015, IEEE Network.
[16] Joseph K. Liu,et al. Security Concerns in Popular Cloud Storage Services , 2013, IEEE Pervasive Computing.
[17] Joseph K. Liu,et al. Two-Factor Data Security Protection Mechanism for Cloud Storage System , 2016, IEEE Transactions on Computers.
[18] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[19] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[20] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[21] Weixin Xie,et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[22] Mihir Bellare,et al. Efficiently-Searchable and Deterministic Asymmetric Encryption , 2006 .
[23] Chunhua Su,et al. Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data , 2016, AsiaCCS.